In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
We are working on a system for the optimised access and replication of data on a Data Grid. Our approach is based on the use of an economic model that includes the actors and the ...
Mark James Carman, Floriano Zini, Luciano Serafini...
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...